
Student Profile
A Professionally Diverse Student Body
There is a great deal of professional diversity among Pace’s DPS students. Entering students’ careers extend from 6 to 33 years, with an average of about 13 years. Professional activities include software development, telecommunications management, data management, and e-commerce, with employers such as:
|
|
Many of our DPS students live and work in the greater New York metropolitan area, but others travel from California, Washington, D.C., Philadelphia, and Boston for the on-site sessions that occur monthly, five times a semester, on Friday evening and all day Saturday. In between the on-site sessions, students and faculty interact energetically over the Internet.
Dissertations
The DPS dissertation is an original, rigorous, independent applied research product that may
- advance knowledge
- improve professional practice
- contribute to the understanding of computing
- be a disciplined and systematic inquiry for the purpose of discovery, establishing or extending the field of study
Research methods used depend upon the nature of the research
- controlled experiment
- project development
- empirical studies
- theoretical analyses
- or other methods as appropriate
Examples of dissertation areas:
Data Warehousing, Pattern Languages, Visualization of Data, Genetic Algorithms, Distributed Systems Architecture, Software Component Integration, Web Personalization, Software Testing, Data Security, Information Assurance, Web Content Management, Broadband Wireless Network Access Services, Pervasive Computing, Information Retrieval, Knowledge Management, Software Product Quality and CMMI, Cybercrime, Biometrics, Pattern Recognition, Web services and Service Oriented Architecture, Agile methods in business and other non-software development processes.
List of Dissertations
Carl Abrams, Shape Matching with Ordered Boundary Point Shape Contexts Using a Least Cost Diagonal Method, 2006
Bashir U. Ahmed, Detection of Foreign Words and Names in Written Text, 2005
Maria Azua Himmel, Qualitative Analysis of Cloud Computing Risks and Framework for the Rationalization and Mitigation of Cloud Risks, 2012
Richard Bassett, Computer-based Objective Interactive Numismatic System, 2003
Leslie Beckford, Facilitating the Use of Patterns via a Generic Framework That Supports Semi-Automatic Concept Indexing and In-Depth Searching, 2004
Gulsebnem Bishop, Classification of Greek Pottery Shapes and Schools Using Image Retrieval Techniques, 2006
Lawrence A. Bliss, Selecting Artificial Network Inputs Using Particle Swarm Optimization, 2003
Raymond E. Boehm, An Approach to Early Lifecycle Estimating for Agile Projects, 2011
Andrew W. Boyd, A Longitudinal Study of Social Media Privacy Behavior, 2011
Kenneth Charles Brancik, Insider Computer Fraud Detection in Applications: A Defense in Depth framework involving Software Engineering and Novelty Neural Networks, 2005
Kathleen M. Bravo, A Model for HIPAA Security Compliance, 2005
Carlos Delano Buskey, A Software Metrics Based Approach to Enterprise Software Beta Testing Design, 2005
Mirkeya Capellan, An Agile Course-Delivery Approach, 2009
Hsiauh-Tsyr Clara Chang, Optimized Software Component Allocation on clustered Application Servers, 2004
Borming Chiang, A Feasibility Study: Secure Public Key Infrastructure with Quantum Key Distributions in Grid Computing, 2006
Seung-Seok Choi, Correlation Analysis of Binary Similarity / Dissimilarity Measures, 2008
Donna J. Clapsaddle, Measuring Usability: Categorically Modeling Successful Websites Using Established Metrics, 2004
Eric Cole, Stego-Marking Packets to Control Information Leakage on TCP/IP Based Networks, 2004
Mary Curtin, Long-Text Keystroke Biometric Applications Over the Internet, 2006
Eddie A. Davis, The effects of Technological and Organizational Innovations on Business Value in the context of a New Product or Service Deployment, 2010
Joseph DeCicco, Sensitivity Analysis of Certain Time Dependent Matroid Base Models Solved by Genetic Algorithms, 2002
Rigoberto Diaz, Solving a Class of Time-Dependent Combinatorial Optimization Problems with Abstraction, Transformation and Simulated Annealing, 2004
Fred Dreyfus, A Study of Access Control in Wireless Communications Utilizing Game Theory, 2009
Barbara Edington, A Model of Internal Contextual Factor Relationships Affecting Technology Implementations, 2005
Romerl Elizes, Investigating the Value of Using Sequences of Natural Computing Heuristics to Address Traveling Salesman Problem, 2008
Joe Feliciano, The Success Criteria for Implementing Knowledge Management Systems in an Organization, 2006
Ronald I. Frank, Regular Array Expansions in Null Arrays, with Applications: Zero is Not Nothing, 2002
Matthew Robert Ganis, A study of the agile whole team and its effectiveness in the software development process, 2009
Anthony Gottlieb, Efficient Static Analysis of Java Source Code for Security, 2006
Kevin Gravesande, Using Geographic Information Systems (GIS) to Improve Patient-Clinician Encounters and Patient Care, 2010
Abraham Guerra, A Framework for Building Intelligent Software Assistants for Virtual Worlds, 2010
Darren Hayes, The Efficacy of Project Retrospectives on Organizational Process Improvement Initiatives in Software Development, 2008
Karina J. Hernandez, Reasoning and Learning under Uncertainty Using Dynamic Probabilistic Models For Real Time Problem Determination, 2004
Jonathan Hill, Apply Abstraction to Master Complexity: The Comparison of Abstraction Ability in Computer Science Majors with Students in Other Disciplines, 2007
Jingkun Hu, Visual Modeling of XML Constraints Based on A New Extensible Constraint, 2003
Rita Hubert, Usability Field Study of Older Adults Using Multi-modal Home Health Monitoring Devices, 2006
Christopher W. Iervolino, Using Data Envelopment Analysis To Measure Web Site Efficiency, 2002
Hevel Jean-Baptiste, A Distributed Architecture for U-Messaging Systems (DAUMS), 2002
Melanie Johnson, Multi-Project Staffing: An Agile based Framework, 2006
Satty Joshua, A Three-Prong Network Solution Approach - A Sustainable Business Case Centered approach in Networking Convergence, 2006
Bintou Kane Aidara, XML Update Transaction Execution Based on Incremental Constraint Checks, 2011
Suman K. Kalia, A Study of the Pervasive Computing Solution to Asset, Problem and Knowledge Management, 2002
Maheswara Prasad Kasinadhuni, Solving Optimization Problems Using Genetic Algorithms with Multiple Genome Coding, 2004
James Kile, An Investigation into the Effectiveness of Agile Software Development with a Highly Distributed Workforce, 2007
Todd W. Kolb, Efficient Solutions to a class of Generalized Time-Dependent Combinatorial Optimization Problems, 2005
Stella Kontantinou, A Web Service Framework for Automating Constituent Product Costing Operations of Business Producing , 2004
Adam Kuta, Enterprise Interceptor: A Framework for Applications Interchangeability, 2006
Thanh Van Lam, Run-Time Interface Mapping For On-The-Fly Software Component Integration, 2002
Patricia H. Lapczynski, An Integrated Model of Technology Acceptance for Mobile Computing, 2004
Jonathan K. Law, An Efficient First Pass of a Two-Stage Approach for Automatic Language Indentification of Telephone Speech, 2002
James P. Lawler, A Study of Customer Loyalty and Privacy on the Web, 2002
Kwang W. Lee, An efficient Procedure to Select a Near-Optimal Subset of Pattern Classification Features, 2002
Donald Little, Optimizing Effective Data Rates Among Contending Wireless Devices on a Shared Channel, 2007
Thomas Edward Lombardi, The Classification of Style in Fine-Art Painting, 2005
Mary L. Manfredi, Copybook Style Determination of Pseudo-Online Handwriting Data, 2005
Anne Mannette-Wright, A Feasibility Study of Ontology-Based Automatic Document Transformation, 2009
Theodore J. Markowitz, An Empirical Evaluation of Active Learning and Selective Sampling Variations Supporting Large Corpus Labeling, 2011
Marilyn Mead, Practitioner's Guide to Software Testing, 2002
Peter J. Morales, A computational econometric modeling technique for the parametric simulation of effort and duration estimation as applied to the development of software systems, 2011
Pauline H. Mosley, The Cognitive Complexities Confronting Developers Using Object Technology, 2002
Yonesy F. Nunez, Maximizing an Organization’s Information Security Posture by Using a Distributed Patch Management Security System, 2011
Christopher Nwosisi, Developing a Genetic Algorithm to Construct Efficient Binary Decision Trees, 2010
Jill O’Sullivan, Validating Academic Training versus Organizational Training: An Analysis in the Enterprise Resource Planning (ERP) Field, 2011
Josua Purba, Dynamic Sub-Channel Allocation in OFDMA Systems, 2011
Visveshwar Reddy, Estimating Intrinsic Engineering Value of Emerging Software Innovations, 2010
Mark Ritzmann, Strategies for Managing Missing and Incomplete Information with Applications to Keystroke Biometric Data and a Business Analytical Application, 2009
Hany Saleeb, Information Retrieval: A Framework for Recommending Text-based Classification Algorithms, 2002
Carolyn J. Sher DeCusatis, The Effects of Cloud Computing on Vendor’s Data Center Network Component Design, 2011
Renel Smith, Gameplay to Introduce and Reinforce Requirements Engineering Good Practices, 2009
Carlos A. Thomas, Assessing the Factors that Determine Compliance with the Federal Information Security Management Act (FISMA), 2011
Frances Trees, A Meta-Analysis of Pedagogical Tools used in Introductory Programming Courses, 2010
Alexander Tsekhansky, Byzantine-Reliable Domain Name Service protocol in networks with limited Public Key Infrastructure, 2010
David B. Ulmer, Architectural Solutions to Agent-Enabling, 2004
Gokbora Uran, A Hybrid Heuristic Model for Classification Rule Discovery, 2005
Mary Villani, Keystroke Biometric Identification Studies on Long-Text Input, 2006
Daniel Scott Weaver, Prospective Students' Reactions to the Presentation of the Computer Science Major, 2010
Roli Garg Wendorf, Channel-Change Games in Spectrum-Agile Wireless Networks, 2005
Sandra Westcott, Effectiveness of Using Digital Game Playing in a First-Level Programming Course, 2008
Aurelia Williams, Pair Formation in CS1: Self-Selection vs Random Pairing, 2006
Patrick Wong, Effects of 802.11 Protocols in Broadband wireless communication, 2002
Robert Zack, An Improved k-NN Classification Method with Application to Keystroke Biometric Authentication, 2010
Robert Zandoli, An Agile Framework for an Information Technology Outsourcing Decision process (ITODP), 2006
